New threats subverting digital signature validation

  • Published in

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50...

Read More

Temporary workers still require adequate data protection training, warns ICO

  • Published in

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More


Fighting evolving targeted attacks

  • Published in

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec Messaging Gateway, network threat protection for Mac.

Read More

Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and Information Technology Center (ZIVIT), the internal IT service provider for the Federal Revenue Administration and other federal authorities in Germany. The framework agreements are multi-year deals with a volume of up to 4,840 man-months.

Read More

Splunk turns to Ping Identity

  • Published in

Splunk has selected Ping Identity to provide its customers with simple and secure access to the Splunk customer portal.

Read More

According to IDC's Europe, Middle East and Africa Quarterly Security Appliance Tracker, 3Q12...
33% said a malware attack cost on average between £10,000 and £50,000 to remediate,...
Aerohive Networks has developed a new iOS App for guest and Bring Your Own Device (BYOD) management...
Research released by IT analyst firm Quocirca, in conjunction with Digital Guardian, has revealed a...
STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for...
BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more